default search action
Cryptologia, Volume 45
Volume 45, Number 1, 2021
- Kenneth J. Bures:
Cracking PURPLE: cryptanalysis of the Angooki Taipu B switch tables. 1-43 - István Daruka:
On the Voynich manuscript. 44-80 - Betsy Rohaly Smoot:
Sources and methods: uncovering the story of American Cryptology in World War I. 81-87
- Chris Christensen:
Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field. 88-93
Volume 45, Number 2, 2021
- John A. Tokar:
NSA honors two Cryptologia board members. 97-101 - Gregory J. Nedved:
Herbert O. Yardley revisited: what does the new evidence say? 102-128 - José Ramón Soler Fuensanta, Héctor Soler Bonet, Diego Navarro Bonilla:
How to make a codebook versatile. The example of the ASLET code. 129-166 - Kirsten Tate:
Identifying concealed messages using authorship attribution. 167-177 - Nicolas T. Courtois:
A nonlinear invariant attack on T-310 with the original Boolean function. 178-192
Volume 45, Number 3, 2021
- 18th cryptologic history symposium. 193
- Åvald Åslaugson Sommervoll, Leif Nilsen:
Genetic algorithm attack on Enigma's plugboard. 194-226
- Dimpy Chauhan, Indivar Gupta, Rashmi Verma:
Quasigroups and their applications in cryptography. 227-265
- George Teseleanu:
Quasigroups and substitution permutation networks: a failed experiment. 266-281 - Viktor Wase:
Benford's law in the Beale ciphers. 282-286
- John F. Dooley:
Review of Flight of the Fox by Gray Basnight. 287-288
Volume 45, Number 4, 2021
- Frode Weierud:
In memoriam: Thomas Ralph Erskine CB (1933 - 2021). 289-308 - Jean-François Bouchaudy:
Enigma: the spoils of Gustave Bertrand, or "par où tout a commencé". 309-341 - Rémi Géraud-Stewart, David Naccache:
A French cipher from the late 19th century. 342-370 - Robert J. Hanyok:
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions. 371-378
- Ralph Erskine:
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones. 379-382
Volume 45, Number 5, September 2021
- George Lasry, Ingo Niebel, Torbjörn Andersson:
Deciphering German diplomatic and naval attaché messages from 1900-1915. 383-425 - Ronald Phelan, David Simpson:
Ludlings: not all fun and games. 426-433 - Torsten Timm, Andreas Schinner:
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann. 434-438 - Blain Patterson:
Analyzing student understanding of cryptography using the SOLO taxonomy. 439-449 - Malik Zia Ullah Bashir, Rashid Ali:
Cryptanalysis and improvement of a blind multi-document signcryption scheme. 450-464 - Betsy Rohaly Smoot:
Sources and methods for cryptologic history: researching individuals (and the biography boom). 465-473 - Chris Christensen:
Review of Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton. 474-477
Volume 45, Number 6, November 2021
- George Lasry, Beáta Megyesi, Nils Kopal:
Deciphering papal ciphers from the 16th to the 18th Century. 479-540 - J. Mohamedmoideen Kader Mastan, R. Pandian:
Cryptanalysis of two similar chaos-based image encryption schemes. 541-552 - Barry J. Griffiths:
Cryptography in undergraduate education: perceptions of postgraduate students. 553-562 - Chris Christensen:
Review of The Codebreakers of Bletchley Park by Dermot Turing. 563-564 - Chris Christensen:
Review of A Course in Cryptography by Heiko Knospe. 565-568 - Chris Christensen:
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo. 569-570 - Chris Christensen:
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh. 497
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.